files.com 1.0.369 → 1.0.371

Sign up to get free protection for your applications and to get access to all the features.
checksums.yaml CHANGED
@@ -1,7 +1,7 @@
1
1
  ---
2
2
  SHA256:
3
- metadata.gz: 8e54ec978c1847fd669b94f75db924f8f3b98c3931918c12e6d16171464a7104
4
- data.tar.gz: c4d6341c54ed17100ca0e71526ce15f162e5681ca4c1dc4c70bbe0cac8925663
3
+ metadata.gz: '0811bbd05ab1828ae8a62a6439f3133e269c36996ef927ca24602c81333ff4a1'
4
+ data.tar.gz: fcd74ccaab330bc3d53cdf2d8e76a34667f84e6041c0a8a8e4e860f7a10e5209
5
5
  SHA512:
6
- metadata.gz: a986cb97c79e86c20e6046dc90021f549e330a5ad7e332f1d98529e6f3c0d284cfdd05a7f53f8f9410589c24e299230951582336f38a1847c4e19f4d1b8d32cc
7
- data.tar.gz: 0b215d11abf59aa8323ef6ef47470a5afdce8df2242994d11d70b5b460043ea43ffe7e3bfff3ef4bdff213ed045dde6a7169634918e53c7b97a5be2b9a7cb422
6
+ metadata.gz: 8cd726b632441a2899cde0be800fdc86f11559420a59d455a1bdf985ea2fa0010e761e2ede3a24578bdd8292d9f114da34915e0f88d555da951ee52bd9aa0aba
7
+ data.tar.gz: 23e0abdef92a20a351d2ff3f42986acabe310e13b7c8dc1f8ddd063dcaa126c9ec11c256e533e14a112635269547abf058223022de30b2c01c2f742a9775515e
data/_VERSION CHANGED
@@ -1 +1 @@
1
- 1.0.369
1
+ 1.0.371
data/docs/public_key.md CHANGED
@@ -7,7 +7,9 @@
7
7
  "id": 1,
8
8
  "title": "My public key",
9
9
  "created_at": "2000-01-01T01:00:00Z",
10
- "fingerprint": "43:51:43:a1:b5:fc:8b:b7:0a:3a:a9:b1:0f:66:73:a8"
10
+ "fingerprint": "43:51:43:a1:b5:fc:8b:b7:0a:3a:a9:b1:0f:66:73:a8",
11
+ "username": "User",
12
+ "user_id": 1
11
13
  }
12
14
  ```
13
15
 
@@ -15,7 +17,8 @@
15
17
  * `title` (string): Public key title
16
18
  * `created_at` (date-time): Public key created at date/time
17
19
  * `fingerprint` (string): Public key fingerprint
18
- * `user_id` (int64): User ID. Provide a value of `0` to operate the current session's user.
20
+ * `username` (string): Username of the user this public key is associated with
21
+ * `user_id` (int64): User ID this public key is associated with
19
22
  * `public_key` (string): Actual contents of SSH key.
20
23
 
21
24
 
data/docs/site.md CHANGED
@@ -185,6 +185,7 @@
185
185
  "public_keys_count": 1,
186
186
  "receive_admin_alerts": true,
187
187
  "require_2fa": "always_require",
188
+ "require_login_by": "2000-01-01T01:00:00Z",
188
189
  "active_2fa": true,
189
190
  "require_password_change": true,
190
191
  "password_expired": true,
data/docs/user.md CHANGED
@@ -48,6 +48,7 @@
48
48
  "public_keys_count": 1,
49
49
  "receive_admin_alerts": true,
50
50
  "require_2fa": "always_require",
51
+ "require_login_by": "2000-01-01T01:00:00Z",
51
52
  "active_2fa": true,
52
53
  "require_password_change": true,
53
54
  "password_expired": true,
@@ -110,6 +111,7 @@
110
111
  * `public_keys_count` (int64): Number of public keys associated with this user
111
112
  * `receive_admin_alerts` (boolean): Should the user receive admin alerts such a certificate expiration notifications and overages?
112
113
  * `require_2fa` (string): 2FA required setting
114
+ * `require_login_by` (date-time): Require user to login by specified date otherwise it will be disabled.
113
115
  * `active_2fa` (boolean): Is 2fa active for the user?
114
116
  * `require_password_change` (boolean): Is a password change required upon next user login?
115
117
  * `password_expired` (boolean): Is user's password expired?
@@ -214,6 +216,7 @@ Files::User.create(
214
216
  office_integration_enabled: true,
215
217
  password_validity_days: 1,
216
218
  receive_admin_alerts: true,
219
+ require_login_by: "2000-01-01T01:00:00Z",
217
220
  require_password_change: true,
218
221
  restapi_permission: true,
219
222
  self_managed: true,
@@ -263,6 +266,7 @@ Files::User.create(
263
266
  * `office_integration_enabled` (boolean): Enable integration with Office for the web?
264
267
  * `password_validity_days` (int64): Number of days to allow user to use the same password
265
268
  * `receive_admin_alerts` (boolean): Should the user receive admin alerts such a certificate expiration notifications and overages?
269
+ * `require_login_by` (string): Require user to login by specified date otherwise it will be disabled.
266
270
  * `require_password_change` (boolean): Is a password change required upon next user login?
267
271
  * `restapi_permission` (boolean): Can this user access the REST API?
268
272
  * `self_managed` (boolean): Does this user manage it's own credentials or is it a shared/bot user?
@@ -347,6 +351,7 @@ Files::User.update(id,
347
351
  office_integration_enabled: true,
348
352
  password_validity_days: 1,
349
353
  receive_admin_alerts: true,
354
+ require_login_by: "2000-01-01T01:00:00Z",
350
355
  require_password_change: true,
351
356
  restapi_permission: true,
352
357
  self_managed: true,
@@ -397,6 +402,7 @@ Files::User.update(id,
397
402
  * `office_integration_enabled` (boolean): Enable integration with Office for the web?
398
403
  * `password_validity_days` (int64): Number of days to allow user to use the same password
399
404
  * `receive_admin_alerts` (boolean): Should the user receive admin alerts such a certificate expiration notifications and overages?
405
+ * `require_login_by` (string): Require user to login by specified date otherwise it will be disabled.
400
406
  * `require_password_change` (boolean): Is a password change required upon next user login?
401
407
  * `restapi_permission` (boolean): Can this user access the REST API?
402
408
  * `self_managed` (boolean): Does this user manage it's own credentials or is it a shared/bot user?
@@ -502,6 +508,7 @@ user.update(
502
508
  office_integration_enabled: true,
503
509
  password_validity_days: 1,
504
510
  receive_admin_alerts: true,
511
+ require_login_by: "2000-01-01T01:00:00Z",
505
512
  require_password_change: true,
506
513
  restapi_permission: true,
507
514
  self_managed: true,
@@ -552,6 +559,7 @@ user.update(
552
559
  * `office_integration_enabled` (boolean): Enable integration with Office for the web?
553
560
  * `password_validity_days` (int64): Number of days to allow user to use the same password
554
561
  * `receive_admin_alerts` (boolean): Should the user receive admin alerts such a certificate expiration notifications and overages?
562
+ * `require_login_by` (string): Require user to login by specified date otherwise it will be disabled.
555
563
  * `require_password_change` (boolean): Is a password change required upon next user login?
556
564
  * `restapi_permission` (boolean): Can this user access the REST API?
557
565
  * `self_managed` (boolean): Does this user manage it's own credentials or is it a shared/bot user?
@@ -41,7 +41,16 @@ module Files
41
41
  @attributes[:fingerprint] = value
42
42
  end
43
43
 
44
- # int64 - User ID. Provide a value of `0` to operate the current session's user.
44
+ # string - Username of the user this public key is associated with
45
+ def username
46
+ @attributes[:username]
47
+ end
48
+
49
+ def username=(value)
50
+ @attributes[:username] = value
51
+ end
52
+
53
+ # int64 - User ID this public key is associated with
45
54
  def user_id
46
55
  @attributes[:user_id]
47
56
  end
@@ -383,6 +383,15 @@ module Files
383
383
  @attributes[:require_2fa] = value
384
384
  end
385
385
 
386
+ # date-time - Require user to login by specified date otherwise it will be disabled.
387
+ def require_login_by
388
+ @attributes[:require_login_by]
389
+ end
390
+
391
+ def require_login_by=(value)
392
+ @attributes[:require_login_by] = value
393
+ end
394
+
386
395
  # boolean - Is 2fa active for the user?
387
396
  def active_2fa
388
397
  @attributes[:active_2fa]
@@ -691,6 +700,7 @@ module Files
691
700
  # office_integration_enabled - boolean - Enable integration with Office for the web?
692
701
  # password_validity_days - int64 - Number of days to allow user to use the same password
693
702
  # receive_admin_alerts - boolean - Should the user receive admin alerts such a certificate expiration notifications and overages?
703
+ # require_login_by - string - Require user to login by specified date otherwise it will be disabled.
694
704
  # require_password_change - boolean - Is a password change required upon next user login?
695
705
  # restapi_permission - boolean - Can this user access the REST API?
696
706
  # self_managed - boolean - Does this user manage it's own credentials or is it a shared/bot user?
@@ -728,6 +738,7 @@ module Files
728
738
  raise InvalidParameterError.new("Bad parameter: company must be an String") if params[:company] and !params[:company].is_a?(String)
729
739
  raise InvalidParameterError.new("Bad parameter: notes must be an String") if params[:notes] and !params[:notes].is_a?(String)
730
740
  raise InvalidParameterError.new("Bad parameter: password_validity_days must be an Integer") if params[:password_validity_days] and !params[:password_validity_days].is_a?(Integer)
741
+ raise InvalidParameterError.new("Bad parameter: require_login_by must be an String") if params[:require_login_by] and !params[:require_login_by].is_a?(String)
731
742
  raise InvalidParameterError.new("Bad parameter: ssl_required must be an String") if params[:ssl_required] and !params[:ssl_required].is_a?(String)
732
743
  raise InvalidParameterError.new("Bad parameter: sso_strategy_id must be an Integer") if params[:sso_strategy_id] and !params[:sso_strategy_id].is_a?(Integer)
733
744
  raise InvalidParameterError.new("Bad parameter: require_2fa must be an String") if params[:require_2fa] and !params[:require_2fa].is_a?(String)
@@ -851,6 +862,7 @@ module Files
851
862
  # office_integration_enabled - boolean - Enable integration with Office for the web?
852
863
  # password_validity_days - int64 - Number of days to allow user to use the same password
853
864
  # receive_admin_alerts - boolean - Should the user receive admin alerts such a certificate expiration notifications and overages?
865
+ # require_login_by - string - Require user to login by specified date otherwise it will be disabled.
854
866
  # require_password_change - boolean - Is a password change required upon next user login?
855
867
  # restapi_permission - boolean - Can this user access the REST API?
856
868
  # self_managed - boolean - Does this user manage it's own credentials or is it a shared/bot user?
@@ -884,6 +896,7 @@ module Files
884
896
  raise InvalidParameterError.new("Bad parameter: company must be an String") if params[:company] and !params[:company].is_a?(String)
885
897
  raise InvalidParameterError.new("Bad parameter: notes must be an String") if params[:notes] and !params[:notes].is_a?(String)
886
898
  raise InvalidParameterError.new("Bad parameter: password_validity_days must be an Integer") if params[:password_validity_days] and !params[:password_validity_days].is_a?(Integer)
899
+ raise InvalidParameterError.new("Bad parameter: require_login_by must be an String") if params[:require_login_by] and !params[:require_login_by].is_a?(String)
887
900
  raise InvalidParameterError.new("Bad parameter: ssl_required must be an String") if params[:ssl_required] and !params[:ssl_required].is_a?(String)
888
901
  raise InvalidParameterError.new("Bad parameter: sso_strategy_id must be an Integer") if params[:sso_strategy_id] and !params[:sso_strategy_id].is_a?(Integer)
889
902
  raise InvalidParameterError.new("Bad parameter: require_2fa must be an String") if params[:require_2fa] and !params[:require_2fa].is_a?(String)
@@ -960,6 +973,7 @@ module Files
960
973
  # office_integration_enabled - boolean - Enable integration with Office for the web?
961
974
  # password_validity_days - int64 - Number of days to allow user to use the same password
962
975
  # receive_admin_alerts - boolean - Should the user receive admin alerts such a certificate expiration notifications and overages?
976
+ # require_login_by - string - Require user to login by specified date otherwise it will be disabled.
963
977
  # require_password_change - boolean - Is a password change required upon next user login?
964
978
  # restapi_permission - boolean - Can this user access the REST API?
965
979
  # self_managed - boolean - Does this user manage it's own credentials or is it a shared/bot user?
@@ -996,6 +1010,7 @@ module Files
996
1010
  raise InvalidParameterError.new("Bad parameter: company must be an String") if params[:company] and !params[:company].is_a?(String)
997
1011
  raise InvalidParameterError.new("Bad parameter: notes must be an String") if params[:notes] and !params[:notes].is_a?(String)
998
1012
  raise InvalidParameterError.new("Bad parameter: password_validity_days must be an Integer") if params[:password_validity_days] and !params[:password_validity_days].is_a?(Integer)
1013
+ raise InvalidParameterError.new("Bad parameter: require_login_by must be an String") if params[:require_login_by] and !params[:require_login_by].is_a?(String)
999
1014
  raise InvalidParameterError.new("Bad parameter: ssl_required must be an String") if params[:ssl_required] and !params[:ssl_required].is_a?(String)
1000
1015
  raise InvalidParameterError.new("Bad parameter: sso_strategy_id must be an Integer") if params[:sso_strategy_id] and !params[:sso_strategy_id].is_a?(Integer)
1001
1016
  raise InvalidParameterError.new("Bad parameter: require_2fa must be an String") if params[:require_2fa] and !params[:require_2fa].is_a?(String)
metadata CHANGED
@@ -1,14 +1,14 @@
1
1
  --- !ruby/object:Gem::Specification
2
2
  name: files.com
3
3
  version: !ruby/object:Gem::Version
4
- version: 1.0.369
4
+ version: 1.0.371
5
5
  platform: ruby
6
6
  authors:
7
7
  - files.com
8
8
  autorequire:
9
9
  bindir: bin
10
10
  cert_chain: []
11
- date: 2023-07-13 00:00:00.000000000 Z
11
+ date: 2023-07-19 00:00:00.000000000 Z
12
12
  dependencies:
13
13
  - !ruby/object:Gem::Dependency
14
14
  name: addressable